Feeds

TOADOCALYPSE NOW: Madagascar faces down amphibious assault

Cane toad's poisonous relo invades Indian Ocean island

Secure remote control for conventional and virtual desktops

A group of scientists has urged the Madagascan government to take up arms against the Asian common toad - a poisonous relative of the infamous cane toad which has gained a foothold on the Indian Ocean island.

In a letter to Nature, Jonathan Kolby of Oz's James Cook University, together with 11 other researchers, warn that Madagascar is facing an "ecological disaster" if it doesn't act to curtail the incursion.

According to the BBC, the first of several sightings of the Asian common toad (Duttaphrynus melanostictus) came back in March. It's suspected that the creature probably launched an amphibious assault on the island via shipping containers from South East Asia.

The Asian common toad. Pic: Shutterstock

Toadocalypse Now: The Asian common toad. Pic: Shutterstock

Kolby said: "It's worrying because Madagascar has amazing endemic biodiversity - plants, animals and amphibians that are found nowhere else. And this one species has the propensity to damage that."

The Asian cane toad poses two threats: it's poisonous and it might spread the chytrid fungus. The latter menace (Batrachochytrium dendrobatidis) has already done serious damage to amphibian populations in Australia and Central and South America, and a few years back arrived in the UK.

It remains to be seen if Duttaphrynus melanostictus wreaks the same kind of havoc in Madagscar as the cane toad (Bufo marinus) has done Down Under.

Introduced into Northern Queensland from Hawaii in 1935 in an attempt to combat native cane beetles, the toad has since hopped 3,000km across the Lucky Country, swelling in numbers to over 200 million, and making short work of local snakes, lizards and other defenceless animals.

Kolby and colleagues insist swift action is required to prevent Madagascar suffering a similar toadocalypse. He concluded: "The question is, can we still eradicate them? Have we caught it soon enough that eradication could be a feasible option? Obviously we all hope the answer is yes." ®

Next gen security for virtualised datacentres

More from The Register

next story
Vulture 2 takes a battering in 100km/h test run
Still in one piece, but we're going to need MORE POWER
Boffins ID freakish spine-smothered prehistoric critter: The CLAW gave it away
Bizarre-looking creature actually related to velvet worms
TRIANGULAR orbits will help Rosetta to get up close with Comet 67P
Probe will be just 10km from Space Duck in October
CRR-CRRRK, beep, beep: Mars space truck backs out of slippery sand trap
Curiosity finds new drilling target after course correction
ANU boffins demo 'tractor beam' in water
The current state of the art, apparently
China to test recoverable moon orbiter
I'll have some rocks and a moon cheese pizza please, home delivery
What does a flashmob of 1,024 robots look like? Just like this
Sorry, Harvard, did you say kilobots or KILLER BOTS?
NASA's rock'n'roll shock: ROLLING STONE FOUND ON MARS
No sign of Ziggy Stardust and his band
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.